Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:41

General

  • Target

    df0a260bc59862486ba27960e27adec519d0790d2f189c43b7da7cb92cdaa61d.exe

  • Size

    136KB

  • MD5

    f0c587020ea24a9ba16f2529345bcc92

  • SHA1

    f693ddc7a056037c3f48dc4a0ec486f195369f44

  • SHA256

    df0a260bc59862486ba27960e27adec519d0790d2f189c43b7da7cb92cdaa61d

  • SHA512

    9dbe324821a10522d8eb56dbdf0660d1242e12316d74b077b0f04d6cb18c4200d32b6b671c4b12b52cf09de4d8308a962533d655c02690d63d88b199f3d8ada3

  • SSDEEP

    3072:6TDUEUbaxvN3wSUh2XZDutcHdVmn8+3o7:6TDUcI3qdVy8+Y7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 55 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df0a260bc59862486ba27960e27adec519d0790d2f189c43b7da7cb92cdaa61d.exe
    "C:\Users\Admin\AppData\Local\Temp\df0a260bc59862486ba27960e27adec519d0790d2f189c43b7da7cb92cdaa61d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\waaahu.exe
      "C:\Users\Admin\waaahu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\waaahu.exe

    Filesize

    136KB

    MD5

    985037d59f98ad926fcf0ec2dd1993ae

    SHA1

    c9a4759c5865abafc8cc8d4056c708ebde07a829

    SHA256

    1bbdaa7d1bad4fd9147b396940e3f57cb7d8578eb245ca77ed56de864fad1ff7

    SHA512

    d79bf28f47937f249d935d93a52605b922b34ddb6d79efc6ca4530c9a9ec8a834fa0c637f12f63fa0999f41e596ba35ab126ffedd1fea502dc11d1cf3d243cdc

  • C:\Users\Admin\waaahu.exe

    Filesize

    136KB

    MD5

    985037d59f98ad926fcf0ec2dd1993ae

    SHA1

    c9a4759c5865abafc8cc8d4056c708ebde07a829

    SHA256

    1bbdaa7d1bad4fd9147b396940e3f57cb7d8578eb245ca77ed56de864fad1ff7

    SHA512

    d79bf28f47937f249d935d93a52605b922b34ddb6d79efc6ca4530c9a9ec8a834fa0c637f12f63fa0999f41e596ba35ab126ffedd1fea502dc11d1cf3d243cdc

  • memory/4504-134-0x0000000000000000-mapping.dmp